Authors
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G Paterson
Publication date
2018/10/15
Book
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Pages
315-331
Description
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, without requiring assumptions on the data or query distributions. Our work improves on the previous state-of-the-art due to Kellaris et al. (CCS 2016) in all of these dimensions. Our main attack targets reconstruction of database counts and involves a novel graph-theoretic approach. It generally succeeds when R , the number of records, exceeds , where N is the number of possible values in the database. For a uniform query distribution, we show that it requires volume leakage from only O(N2 łog N) queries (cf. O(N4łog N) in prior work). We present two ancillary attacks. The first identifies the value of a new item added to a database using the volume leakage from fresh queries, in the setting where the adversary …
Total citations
201720182019202020212022202320241162438343924
Scholar articles
P Grubbs, MS Lacharité, B Minaud, KG Paterson - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018
P Grubbs, MS Lacharite, B Minaud, KG Paterson - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018